U

Return to Glossary.

UA
(1) See unnumbered acknowledgment.
(2) See user agent.
UCS
See universal character set.
UCS-2
A 2-byte (16-bit) encoding scheme based on ISO/IEC specification 10646-1. UCS-2 defines three levels of implementation: Level 1-No combining of encoded elements allowed. Level 2-Combining of encoded elements is allowed only for Thai, Indic, Hebrew, and Arabic. Level 3-Any combination of encoded elements are allowed.
UDC
See user-defined character.
UDDS
See user-defined data stream.
UDF
See user-defined function.
UDFS disk pool
An independent disk pool that contains only user-defined file systems. It cannot be a member of a disk pool group unless it is converted to a primary or secondary disk pool.
UDP
See User Datagram Protocol.
UDT
See user-defined type.
UEP
See user entry procedure.
UI
See graphical user interface.
uid
See user identification number.
UID
See user identification.
UIM
See user interface manager.
UIM tag language
An iSeries™ language supported by the user interface manager to define panels, menus, and help items.
U interface
In the reference model for the integrated services digital network (ISDN), the interface that includes the transmission line between the network terminator 1 (NT1) and the line transmission termination (LT).
Ultimedia Business Conferencing
An IBM® licensed program that provides a solution for desktop business conferencing. Ultimedia Business Conferencing is a cooperative processing application that manages the conference from scheduling to completion.
unacknowledged service
In communications, a data transfer service that does not provide for an acknowledgment from data receiver to data sender that the data was received. An active data link connection does not need to be established between receiver and sender before sending the data. See also acknowledged service.
unary expression
An expression that contains one operand.
unary operator
In COBOL, a plus sign (+) or a minus sign (-) that precedes a variable or a left parenthesis in an arithmetic expression, which has the effect of multiplying the expression by +1 or -1, respectively.
unattended mode
In Operations Console, a state of the system when the local controlling system can automatically grant access to a remote request for control of the iSeries system as long as the local controlling system does not have control at the time of the request.
UNBIND command
In SNA, a command used to reset the protocols for a session. See also BIND command.
unblocked signal
In POSIX, a condition that allows a signal-handling action associated with a signal to be performed. See also blocked signal.
UNC
See Universal Naming Convention.
uncommitted read
In DB2® UDB for iSeries, for a read-only cursor, an isolation level that permits any row read during a unit of work to be changed by application processes that are running concurrently, and permits any row changed by application processes that are running concurrently to be read even if that change has not been committed. For a cursor that can be updated, the uncommitted read level is identical to cursor stability. See also repeatable read.
unconfirmed service
In OSI, a service that does not indicate to the sender whether or not data or control information was properly received. An unconfirmed service involves only request and indication service primitives. See also confirmed service.
undelivered message queue
See dead-letter queue.
underrun
Loss of data caused by the inability of a transmitting device or channel to provide data to the communications control logic at a rate that is fast enough for the attached data link or loop.
unformatted
Pertaining to something that is not defined, organized, or arranged in a required manner.
unformatted system service (USS)
A communications function that translates a character-coded command, such as a LOGON or LOGOFF command, into a field-formatted command for processing by formatted system services. USS translates field-formatted replies and responses into character-coded requests for processing by a logical unit. See also formatted system service.
unicast
Transmission of data to a single destination. See also multicast.
unidentified user
A user of the i5/OS™ licensed program who uses the services of i5/OS but who is not automatically reported on by the license management function of i5/OS. An example of an unidentified user is one who accesses an iSeries server through a gateway server that is not iSeries.
Uniform Resource Locator (URL)
The unique address of a file that is accessible in a network such as the Internet. The URL includes the abbreviated name of the protocol used to access the information resource and the information used by the protocol to locate the information resource.
uninterruptible power supply
A source of power from a battery installed between the commercial power and the system that keeps the system running, if a commercial power failure occurs, until it can complete an orderly end to system processing.
union
(1) In the C language, a variable that can hold any one of several data types, one data type at a time.
(2) An SQL operation that combines the results of two select statements. Unions are often used to merge lists of values that are obtained from several tables.
unique constraint
The rule that no two values in a primary key or key of a unique index can be the same. See also check constraint, referential constraint.
unique index
An index that ensures that no identical key values are stored in a table.
unique key
(1) A field or set of fields in a database file that must be unique, ascending, and cannot contain a null value. A unique key can become a parent key.
(2) A key that is constrained so that no two of its values are equal.
unique product
A product that is uniquely identified to the i5/OS operating system by a product identifier (product ID) and version, release, and modification identifiers (Vx, Rx, Mx).
unique-weight sort sequence
A sort sequence in which each graphic character in the sequence has a weight different from the weight of every other graphic character in the sequence.
unit
The defined space within disk units that is addressed by the system.
unit number
The unique identifier of a storage unit within a disk unit or a disk unit subsystem configured on the system.
unit of recovery
A sequence of operations within a unit of work between commit points. See also context.
unit of work
(1) In DB2 UDB for iSeries, a sequence of SQL commands that the database management system (DBMS) treats as a single entity. The DBMS ensures the consistency of data by verifying that either all the data changes made during a unit of work are performed or none of them are performed.
(2) In advanced program-to-program communications, the amount of processing that is started directly or indirectly by a program on the source system.
(3) A recoverable sequence of operations performed by an application between two points of consistency. A unit of work begins when a transaction starts or at a user-requested syncpoint. It ends either at a user-requested syncpoint or at the end of a transaction.
unit-of-work identifier
In advanced program-to-program communications, a unique label assigned to the unit of work. The ID is established when the program on the source system is started and is associated with each job started by that source system on the target system. The unit-of-work identifier provides a beginning-to-end audit trail within an APPC network.
unit reference code (URC)
(1) A group of numbers displayed on the console or control panel that identifies failing parts, system or device states, or system or device status conditions.
(2) The last 4 characters of the SRC.
universal character set (UCS)
The ISO-9000 standard that allows all data to be represented as 2 bytes (UCS-2) or 4 bytes (UCS-4). Encoding in the UCS-2 form can accommodate the necessary characters for most of the world's written languages.
Universal Naming Convention (UNC)
The server name and network name (netname) combined. These names together identify the resource on the domain.
Universal Serial Bus (USB)
A serial-interface standard for telephony and multimedia connections to personal computers.
UNIX® operating system
An operating system, developed by Bell Laboratories, that features multiprogramming in a multiuser environment. The UNIX operating system was originally developed for use on minicomputers, but has been adapted for mainframes and microcomputers. The AIX® operating system is IBM's implementation of the UNIX operating system.
unlike
Pertaining to two or more different operating environments. For example, unlike distribution is distribution between DB2 UDB for iSeries and DB2 UDB environments.
unlink
In IDDU, to remove the association between a database file on disk and a file definition in a data dictionary. See also link.
unload
To remove a volume from a tape unit or a direct access device.
unloaded
Pertaining to a status where the optical image associated with the selected image catalog entry that is not active or not loaded in the active virtual optical device. Only image catalog entries with a status of mounted or loaded can be accessed through the virtual optical device.
unlock
To release an object or system resource that was previously locked and return it to general availability.
unnumbered
In communications, pertaining to a frame format that provides additional control functions, such as XID, DISC, DM, SABM, SABME, UA, and FRMR.
unnumbered acknowledgment (UA)
In communications, a data link command or response that acknowledges the receipt and acceptance of the SABM, SABME, and DISC command protocol data units.
unordered
In binary floating-point, describing the relationship that exists between two values when they cannot be arranged according to relative value. The relationship between two values is unordered either when a not-a-number is compared to any value or when infinity is compared to any value other than infinity.
unpacked decimal format
See zoned decimal format. See also packed decimal format.
unprotected conversation
An LU 6.2 conversation that has a synchronization level of none or confirm. If conversation errors or failures occur, the resources used by the application may be in inconsistent states. See also protected conversation.
unprotected field
A displayed field in which a user can enter, modify, or delete data.
unprotected logical unit of work
The logical unit of work that is used in an unprotected conversation.
unprotected logical unit of work identifier
The logical unit of work identifier that is used in an unprotected conversation.
unprotected storage
The part of the system auxiliary storage pool (ASP) that is not protected by mirrored protection or device parity protection.
unresolved import
An import whose type and name do not yet match the type and name of an export.
untrusted system
A system in a network over which you do not have control of security.
unusable
In cross-site mirroring, pertaining to the mirror copy data state that indicates that the mirror copy contains incoherent data. This occurs (a) during synchronization because synchronization does not preserve the order of writes and (b) if a failure occurs while performing geographic mirroring in asynchronous mode.
update authority
A data authority that allows the user to change the data in an object, such as a journal, a message queue, or a data area.
update file
In RPG, a file from which a program reads a record, changes data fields in the record, and writes the record back to the location from which it came.
update lock
A lock that limits concurrently executing application processes to read-only operations on the data if these processes have not declared that they might update the row.
update operation
An I/O process that changes the data in a record.
update rule
A condition enforced by the database manager that must be met before a column can be updated.
update trigger
A trigger that is defined with the triggering SQL operation UPDATE.
upgrade
(1) Any hardware or software change to a later release, or any hardware addition or software addition.
(2) To add or replace hardware or software with newer models or releases.
upline
Pertaining to controllers that are above devices, and lines that are above controllers in a communications configuration. See also downline.
upload
To transmit data from a computer to a central computer or network, or to an attached device such as a printer.
upstream
Pertaining to the direction opposite to data flow, which is toward the source of a transmission. See also downstream.
URC
See unit reference code.
URL
See Uniform Resource Locator.
usable
In cross-site mirroring, pertaining to the mirror copy data state that indicates that the correct order of updates to the mirror copy from the production copy is being preserved, but the mirror copy may be outdated. The usable mirror copy data state occurs (a) when the system performs geographic mirroring in synchronous mode, (b) after successfully suspending geographic mirroring, and (c) when the mirror copy is successfully detached.
usage type
In i5/OS, a license management function that monitors usage by tracking the number of license users. Concurrent usage type indicates the usage limit is for the number of unique jobs using the product at the same time. Registered usage type indicates the usage limit is for the number of unique license users registered to use the product.
USB
See Universal Serial Bus.
use authority
An object authority that allows the user to run a program or to display the contents of a file. Use authority combines object operational authority, read authority, and execute authority.
user agent (UA)
In OSI X.400, one of two basic parts of electronic mail. A user agent is a program that provides access to the mail system. This program allows users to compose, send, and receive mail.
user ASP
(1) One or more auxiliary storage pools used to isolate journals, journal receivers, and save files from the other system objects stored in the system ASP. See also system ASP, auxiliary storage pool.
(2) One or more storage units used to isolate some objects from the other objects that are stored in the system ASP and other user ASPs. User ASPs are defined by the user.
user-based pricing
A pricing option that provides the capability for the customer to pay for the licensed program on the basis of the number of users.
user class
The classification of a user by the system task, such as security officer, security administrator, programmer, system operator, and user. Each user class has a set of special authorities depending on the security level of the system. The user class determines which options are shown on the IBM-supplied menus.
user configuration
In iSeries Access, the set of files, created by the iSeries Access administrator, that define the user's iSeries Access configuration and the functions used. The files include the configuration file and the command file.
user-controlled environment
An extended program model (EPM) environment that is explicitly created using the QPXXCALL program.
user-created data stream
A data stream that has not been validated by a system program on the system when the data was spooled.
User Datagram Protocol (UDP)
An Internet protocol that provides unreliable, connectionless datagram service. It enables an application program on one machine or process to send a datagram to an application program on another machine or process.
user-defined character (UDC)
A character that is created through the Character Generator Utility (CGU). CGU is an extension of the code page with special user-defined ideographic characters, symbols, or logos. User-defined characters may be present in some of the Japanese, Chinese, and Korean code pages.
user-defined collating sequence
In Query, a collating sequence defined by the user that replaces the EBCDIC collating sequence provided by the system for sorting fields in a query report.
user-defined communications support
An i5/OS function that provides an application program interface (API). User-defined communications support allows user-written application programs to call routines to set up and use a communications protocol over a token-ring, Ethernet, or X.25 network.
user-defined data stream (UDDS)
A data stream in which the user has defined and embedded all device control characters.
user-defined edit code
A number (5 through 9) indicating that editing should be done on a numeric output field according to a pattern predefined to the system program. User-defined edit codes can take the place of edit words, so that repetitive coding of the same edit word is not necessary.
user-defined function (UDF)
A function that is defined to DB2 by using the CREATE FUNCTION statement and that can be referenced thereafter in SQL statements. A user-defined function can be an external function, or an SQL function. See also built-in function.
user-defined type (UDT)
A mechanism that can be used to create new data types. A UDT can extend the capabilities of the built-in data types and capture the unique semantics of user data.
user-defined word
In COBOL, a word, required by a clause or a statement, that must be supplied by the user in a clause or statement.
user domain object
An object on the system that can be accessed directly by a user state program. The object types that can be either system domain or user domain are: *USRSPC, *USRIDX, *USRQ, *PGM, *SQLPKG. All other object types are system domain. See also domain.
user entry procedure (UEP)
The entry procedure, written by the application programmer, that is the target of a dynamic program call. This procedure gets control from the program entry procedure (PEP). See also program entry procedure.
user exit
In Backup Recovery and Media Services, a special operation (*EXIT) available in the control group to permit automatic processing of predefined user routines during control group processing.
user ID
See user identification.
user ID/address
The two-part network name used in the system distribution directory and in the office applications to uniquely identify a user and send electronic mail.
user identification (UID, user ID)
(1) In the UNIX operating system, a string that uniquely identifies each user to the operating system.
(2) The first part of a two-part network name used in the system distribution directory and in the office applications to uniquely identify a user. The network name is usually the same as the user profile name, but does not need to be. See also common user identification.
(3) The name used to associate the user profile with a user when a user signs on to a system.
user identification number (uid)
A 4-byte, unsigned integer (uid) used to identify a user profile. See also group identification number.
user index
In i5/OS application programming interfaces, an object that provides a specific order for byte data according to the value of the data. User index objects reside in the user domain. The system-recognized identifier for the object type is *USRIDX.
user interface
The hardware, or software, or both that enables a user to interact with a system, program, or device.
user interface manager (UIM)
A function of the operating system that provides a consistent user interface by providing comprehensive support for defining and running panels (displays), dialogs, and online help information.
user message queue
A user-created object used to receive messages sent from the system, other users, and application programs.
user name
A string of characters that uniquely identifies a user to a system. See also user identification.
user password
A unique string of characters that a system user enters to identify that user to the system, if the system resources are secured.
user profile
An object with a unique name that contains the user's password, the list of special authorities assigned to a user, and the objects the user owns. The system-recognized identifier for the object type is *USRPRF.
user profile name
The name or code that the system associates with a user when the user signs on the system.
user queue
In i5/OS application programming interfaces, an object consisting of a list of messages that communicate information to other application programs. The system-recognized identifier for the object type is *USRQ.
user registry
A collection of user information, such as user IDs and passwords, that is used as the basis for security control by a system such as a Web application server.
user shell
An interactive shell. The user's CICS® application program runs directly under this CICS facility.
user space
In i5/OS application programming interfaces, an object consisting of a collection of bytes that can be used for storing any user-defined information. The system-recognized identifier for the object type is *USRSPC.
user state program
A program that can access objects in the user domain. All user programs on the system are user domain. A user state program can call only another user state program.
user table
A list of user IDs authorized to an iSeries finance job.
USS
See unformatted system service.